The core concepts of how to hijack a computer session in order to acquire unauthorized access. An example is intercepting the transmission of web browser cookies, so that an attacker has access to them in order to authenticate a certain web-based account.